Win32k LPE vulnerability used in APT attack
☆291Dec 18, 2017Updated 8 years ago
Alternatives and similar repositories for CVE-2015-1701
Users that are interested in CVE-2015-1701 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆323May 9, 2016Updated 9 years ago
- MS15-076 Privilege Escalation☆101Sep 21, 2015Updated 10 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS☆105Jan 25, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- Previously-0day exploit from the Hacking Team leak, written by Eugene Ching/Qavar.☆204Jul 21, 2015Updated 10 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Jun 27, 2016Updated 9 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- Exploiting MS15-061 local Privilege escalation☆49Sep 22, 2015Updated 10 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 8 years ago
- Exploiting Edge's read:// urlhandler☆15Oct 23, 2021Updated 4 years ago
- Windows kernel vulnerability in win32k.sys Driver☆35Dec 6, 2015Updated 10 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Patching Flash binary to stop Flash exploits and zero-days☆62Apr 18, 2017Updated 8 years ago
- ZeroAccess v3 toolkit☆166Dec 18, 2017Updated 8 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- my public code☆166Jan 11, 2017Updated 9 years ago
- POC and exploitation of vulnerabilities☆91Mar 22, 2022Updated 4 years ago
- A windbg extension, extracting token related contents☆41Dec 23, 2020Updated 5 years ago
- ☆128Oct 19, 2016Updated 9 years ago
- My musings with PowerShell☆2,708Nov 19, 2021Updated 4 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆131Sep 26, 2016Updated 9 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Aug 25, 2014Updated 11 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆266Jul 6, 2017Updated 8 years ago
- Trigger and exploit code for CVE-2014-4113☆42Feb 14, 2016Updated 10 years ago
- Exploit primitives for PowerShell☆437Mar 25, 2018Updated 8 years ago
- Source from VMDE paper, adapted to 2015☆189Dec 18, 2017Updated 8 years ago
- ☆21Mar 24, 2015Updated 11 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- CVE-2014-0816☆26Oct 5, 2016Updated 9 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆301May 5, 2016Updated 9 years ago
- Various code from the past (for historical purposes)☆16Aug 4, 2023Updated 2 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆60Jan 11, 2017Updated 9 years ago
- Miscellaneous exploit code☆1,570Oct 6, 2023Updated 2 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,548Aug 2, 2019Updated 6 years ago
- A collection of curated Java Deserialization Exploits☆591May 16, 2021Updated 4 years ago